A Proxy Re-Encryption (PRE) allows a data owner to delegate the decryption rights of some encrypted data stored on the cloud without revealing the data to an honest-but-curious cloud service provider (i.e. the PRE proxy). Furthermore, the data owner can offload most of the computational operations to the cloud service provider and hence, using PRE for encrypted cloud data sharing can be very effective even for data owners using limited resource devices (e.g. mobile devices). However, PRE schemes only enables data owners to delegate the decryption rights of all their encrypted data. A more practical notion is a Conditional PRE (CPRE) that allows us to specify under what condition the decryption of an encrypted data can be delegated, for exam...
The mobile cloud is a highly heterogenous and constantly evolving network of numerous portable devic...
Within a CIBPRE system, a trusted key generation center initializes the CIBPRE machine parameters an...
(c) 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for...
A proxy re-encryption (PRE) allows a data owner to delegate the decryption rights of some encrypted ...
2017, Springer International Publishing AG. Outsource local data to remote cloud has become prevalen...
In this paper, an identity-based conditional proxy re-encryption (PRE) scheme is proposed, where a d...
Abstract—Conditional PRE (CPRE) is a novel public key primitive which enables the group sharing of c...
Proxy Re-Encryption (PRE) is a useful cryptographic primitive that allows a data owner to delegate t...
Conditional PRE (CPRE) is a novel public key primitive which enables the group sharing of confidenti...
DoctorIn a proxy re-encryption (PRE) scheme, a delegator gives a re-encryption key to a semi-trusted...
Although a few unidirectional single-hop Identity-Based Proxy Re-Encryption (IBPRE) systems are avai...
Over years, cloud computing has been rapidly chang-ing the shape of modern computing environment. Th...
In order to solve the challenges of user data security in the cloud computing (storage) environment,...
Proxy Re-Encryption (PRE) is a favorable primitive to realize a cryptographic cloud with secure and ...
Over years, cloud computing has been rapidly changing the shape of modern computing environment. The...
The mobile cloud is a highly heterogenous and constantly evolving network of numerous portable devic...
Within a CIBPRE system, a trusted key generation center initializes the CIBPRE machine parameters an...
(c) 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for...
A proxy re-encryption (PRE) allows a data owner to delegate the decryption rights of some encrypted ...
2017, Springer International Publishing AG. Outsource local data to remote cloud has become prevalen...
In this paper, an identity-based conditional proxy re-encryption (PRE) scheme is proposed, where a d...
Abstract—Conditional PRE (CPRE) is a novel public key primitive which enables the group sharing of c...
Proxy Re-Encryption (PRE) is a useful cryptographic primitive that allows a data owner to delegate t...
Conditional PRE (CPRE) is a novel public key primitive which enables the group sharing of confidenti...
DoctorIn a proxy re-encryption (PRE) scheme, a delegator gives a re-encryption key to a semi-trusted...
Although a few unidirectional single-hop Identity-Based Proxy Re-Encryption (IBPRE) systems are avai...
Over years, cloud computing has been rapidly chang-ing the shape of modern computing environment. Th...
In order to solve the challenges of user data security in the cloud computing (storage) environment,...
Proxy Re-Encryption (PRE) is a favorable primitive to realize a cryptographic cloud with secure and ...
Over years, cloud computing has been rapidly changing the shape of modern computing environment. The...
The mobile cloud is a highly heterogenous and constantly evolving network of numerous portable devic...
Within a CIBPRE system, a trusted key generation center initializes the CIBPRE machine parameters an...
(c) 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for...